Help
RSS
API
Feed
Maltego
Contact
Domain > edutech.obviouslyfakedomain.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-03-07
3.162.3.103
(
ClassC
)
2025-08-28
99.84.66.106
(
ClassC
)
Port 80
HTTP/1.1 302 FoundContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveDate: Thu, 28 Aug 2025 12:35:11 GMTServer: ApacheCache-Control: no-cacheVary: OriginX-Permitted-Cross-Domain-Policies: noneX-XSS-Protection: 1; modeblockX-Request-Id: d47d286c-45f3-4993-aab1-4308876f247dX-Download-Options: noopenX-Runtime: 0.015393X-Frame-Options: sameoriginX-Content-Type-Options: nosniffContent-Security-Policy: default-src https:; connect-src self https:; font-src data: *; img-src data: *; script-src self unsafe-inline unsafe-eval https:; style-src self unsafe-inline https:; report-uri /csp_report?report_onlytrueX-Powered-By: Phusion Passenger(R) 6.0.27Set-Cookie: XSRF-TOKENxgvNI_LQJJBhWm-Gc5Fwy7Pz96Ngv0KPziIVojnOSfOdwSUpE84np6jxsses09j5KPanGXLjfRFUUOaJxW3DwA; path/; SameSiteLax; HttpOnlySet-Cookie: _session_id9e7fa31f1094dd059b9594d3f9898394; path/; HttpOnly; SameSiteLaxLocation: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.htmlStatus: 302 FoundVia: 1.1 0005a84c2971ff4f5bbb79e7ebc622a8.cloudfront.net (CloudFront)X-Cache: Miss from cloudfrontX-Amz-Cf-Pop: HIO50-C1X-Amz-Cf-Id: NZsN76W0PkhUWYHITpQ3E6HcaAMI0dWrae8dI3zHdsZzfhDZZTeEOA html>body>You are being a hrefhttps://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html>redirected/a>./body>/html>
Port 443
HTTP/1.1 302 FoundContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveDate: Thu, 28 Aug 2025 12:35:12 GMTServer: ApacheCache-Control: no-cacheVary: OriginStrict-Transport-Security: max-age0X-Permitted-Cross-Domain-Policies: noneX-XSS-Protection: 1; modeblockX-Request-Id: 46e29ba4-5790-4b45-93cb-6bb84b00e887X-Download-Options: noopenX-Runtime: 0.017327X-Frame-Options: sameoriginX-Content-Type-Options: nosniffContent-Security-Policy: default-src https:; connect-src self https:; font-src data: *; img-src data: *; script-src self unsafe-inline unsafe-eval https:; style-src self unsafe-inline https:; report-uri /csp_report?report_onlytrueX-Powered-By: Phusion Passenger(R) 6.0.27Set-Cookie: XSRF-TOKEN7wr5Uh3Sck2NskzI0-bIlKQSP0ZvAFs1aqrj0Vz3vFvq0UKR_FK0vXyRdqoTyHbLNwxp4t5uTlQDAXcokNUt-w; path/; SameSiteLax; secure; HttpOnlySet-Cookie: _session_ide882a027725170c0cfc6d1b3f1d4c343; path/; HttpOnly; secure; SameSiteLaxLocation: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.htmlStatus: 302 FoundVia: 1.1 0aebf3fe433ff96e68d785fad4ea4c0e.cloudfront.net (CloudFront)X-Cache: Miss from cloudfrontX-Amz-Cf-Pop: HIO50-C1X-Amz-Cf-Id: WmA-1YInwFDXv9rfEm_gu8FFMm6EJ1HpaAdinBV-eWlunV9AQkDzYw html>body>You are being a hrefhttps://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html>redirected/a>./body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]